AI Risk Logo

Intelligence Analysts

Medium48.00%
Salary Range
Low (10th %)$50,670
Median$91,100
High (90th %)$154,360

AI Prompt Guides for Intelligence Analysts

Unlock expert prompt guides tailored for this Intelligence Analysts. Get strategies to boost your productivity and results with AI.

AI Prompt Tool for Intelligence Analysts

Experiment with and customize AI prompts designed for this occupation. Try, edit, and save prompts for your workflow.

Gather, analyze, or evaluate information from a variety of sources, such as law enforcement databases, surveillance, intelligence networks or geographic information systems. Use intelligence data to anticipate and prevent organized crime activities, such as terrorism.

The occupation of Intelligence Analysts has an automation risk of 48.0%, which is moderately high but not entirely automatable. This reflects a base risk of 48.8%, indicating that nearly half of the tasks in this job could potentially be performed by automated systems or artificial intelligence in the foreseeable future. Many of the daily responsibilities of intelligence analysts involve data-heavy and pattern-recognition activities, areas where AI and machine learning have shown great advances. However, the remaining portion of the role still requires uniquely human abilities such as creative analysis and contextual judgment, causing the overall automation risk to remain below 50%. Thus, while automation technologies are likely to transform this occupation substantially, human oversight and input will continue to be necessary. The tasks most susceptible to automation within intelligence analysis are those that involve structured data processing and verification. For example, "Validate known intelligence with data from other sources" can often be handled by algorithms trained to cross-reference and corroborate multiple databases rapidly. Similarly, "Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases" is amenable to automation, as it relies heavily on data mining and integration techniques now commonplace in AI-driven software. Finally, "Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members" can be efficiently executed with network analysis algorithms and speech-to-text technologies, reducing the need for manual review. Conversely, the tasks most resistant to automation rely heavily on human judgment, adaptability, and domain-specific expertise. Operating cameras, radios, or other surveillance equipment often requires real-time decision-making and improvisation, qualities difficult to replicate with machines. Furthermore, gathering and evaluating information using tools such as aerial photographs or radar equipment typically requires nuanced interpretation and field-specific discretion. The task of studying communication code languages or foreign languages to translate intelligence is especially challenging for machines; while translation engines have advanced, subtle nuances, idioms, and contextual meanings still demand human involvement. Bottleneck skills like Originality—measured at 3.1% and 3.5%—underscore this resistance: creative and original thinking, essential to advanced intelligence work, remains an area where machines lag behind skilled analysts.

Filter by Automatable Status
Validate known intelligence with data from other sources.
Partially Automatable
Gather, analyze, correlate, or evaluate information from a variety of resources, such as law enforcement databases.
Partially Automatable
Evaluate records of communications, such as telephone calls, to plot activity and determine the size and location of criminal groups and members.
Partially Automatable
Gather intelligence information by field observation, confidential information sources, or public records.
Partially Automatable
Analyze intelligence data to identify patterns and trends in criminal activity.
Partially Automatable
Collaborate with representatives from other government and intelligence organizations to share information or coordinate intelligence activities.
Partially Automatable
Link or chart suspects to criminal organizations or events to determine activities and interrelationships.
Partially Automatable
Establish criminal profiles to aid in connecting criminal organizations with their members.
Partially Automatable
Identify gaps in information.
Partially Automatable
Design, use, or maintain databases and software applications, such as geographic information systems (GIS) mapping and artificial intelligence tools.
Partially Automatable
Predict future gang, organized crime, or terrorist activity, using analyses of intelligence data.
Partially Automatable
Study the assets of criminal suspects to determine the flow of money from or to targeted groups.
Partially Automatable
Conduct presentations of analytic findings.
Partially Automatable
Develop defense plans or tactics, using intelligence and other information.
Partially Automatable
Interview, interrogate, or interact with witnesses or crime suspects to collect human intelligence.
Partially Automatable
Prepare plans to intercept foreign communications transmissions.
Partially Automatable
Gather and evaluate information, using tools such as aerial photographs, radar equipment, or sensitive radio equipment.
Partially Automatable
Operate cameras, radios, or other surveillance equipment to intercept communications or document activities.
Partially Automatable
Prepare comprehensive written reports, presentations, maps, or charts, based on research, collection, and analysis of intelligence data.
Partially Automatable
Study activities relating to narcotics, money laundering, gangs, auto theft rings, terrorism, or other national security threats.
Partially Automatable
Study communication code languages or foreign languages to translate intelligence.
Partially Automatable

Inspecting Equipment, Structures, or MaterialsMonitoring Processes, Materials, or SurroundingsGetting InformationEstimating the Quantifiable Characteristics of Products, Events, or InformationIdentifying Objects, Actions, and EventsJudging the Qualities of Objects, Services, or PeopleProcessing InformationEvaluating Information to Determine Compliance with StandardsAnalyzing Data or InformationMaking Decisions and Solving ProblemsThinking CreativelyUpdating and Using Relevant KnowledgeDeveloping Objectives and StrategiesScheduling Work and ActivitiesOrganizing, Planning, and Prioritizing WorkPerforming General Physical ActivitiesHandling and Moving ObjectsControlling Machines and ProcessesDocumenting/Recording InformationDrafting, Laying Out, and Specifying Technical Devices, Parts, and EquipmentInterpreting the Meaning of Information for OthersCommunicating with Supervisors, Peers, or SubordinatesCommunicating with People Outside the OrganizationEstablishing and Maintaining Interpersonal RelationshipsAssisting and Caring for OthersSelling or Influencing OthersResolving Conflicts and Negotiating with OthersPerforming for or Working Directly with the PublicCoordinating the Work and Activities of OthersDeveloping and Building TeamsTraining and Teaching OthersRepairing and Maintaining Mechanical EquipmentGuiding, Directing, and Motivating SubordinatesCoaching and Developing OthersProviding Consultation and Advice to OthersPerforming Administrative ActivitiesStaffing Organizational UnitsMonitoring and Controlling ResourcesOperating Vehicles, Mechanized Devices, or EquipmentWorking with ComputersRepairing and Maintaining Electronic Equipment

Microsoft VisioLexisNexisMyspaceLinkedInArrival Departure Information System ADISAutomated Targeting System ATSMcAfeeBingMicrosoft SQL ServerConsular Consolidated Database CCDMicrosoft VisioNortonLifeLock cybersecurity softwareEnforcement Case Tracking System ENFORCEFlowcharting softwareIBM i2 Analyst's NotebookLink analysis softwareRPalantir IntelligenceRefugee, Asylum and Parole System RAPSTelephone analysis softwareThomson Reuters CLEARTimeline softwareStudent and Exchange Visitor Information System SEVISMicrosoft OutlookSASMicrosoft PowerPointSplunk EnterpriseMicrosoft SharePointMicrosoft WordOracle PeopleSoftSAP softwareFacebookTableauApache HadoopGeographic information system GIS softwareMicrosoft AccessTeradata DatabaseStructured query language SQLVeritas NetBackupJavaScriptData visualization softwareApache HiveDjangoApache PigMicrosoft Azure softwarePythonHypertext markup language HTMLOperating system softwareC++LinuxOracle JavaUNIXStatistical analysis softwareApache KafkaMicrosoft ExcelRelational database management softwareWiresharkESRI ArcGIS softwareGoogle Earth ProGeographic information system GIS systemsGoogleApache SparkSnortData mining softwareTensorFlowAmazon Simple Storage Service S3Google Cloud softwareGraphics creation softwareAmazon Web Services AWS softwareTelephone records softwareLexisNexisLinkedInMcAfeeMicrosoft SQL ServerMyspaceAutomated Targeting System ATSText mining softwareNortonLifeLock cybersecurity softwareBingConsular Consolidated Database CCDPhoto enhancement softwareRSASEnforcement Case Tracking System ENFORCEFlowcharting softwareIBM i2 Analyst's NotebookPalantir IntelligenceTelephone analysis softwareThomson Reuters CLEARBiometric Storage System BSSTimeline softwareStudent and Exchange Visitor Information System SEVISSplunk EnterpriseMicrosoft OutlookMicrosoft SharePointMicrosoft WordOracle PeopleSoftSAP softwareFacebookTableauApache HadoopDjangoTeradata DatabaseStructured query language SQLVeritas NetBackupJavaScriptAmazon Web Services AWS softwareData visualization softwareApache HiveApache PigPythonFirewall softwareC++LinuxOracle JavaUNIXStatistical analysis softwareApache KafkaRelational database management softwareWiresharkESRI ArcGIS softwareMicrosoft PowerPointGoogle Earth ProGeographic information system GIS systemsGoogleApache SparkSnortData mining softwareTensorFlowAmazon Simple Storage Service S3Google Cloud softwareGraphics creation softwareTelephone records softwareMicrosoft Azure softwareHypertext markup language HTMLOperating system softwareGeographic information system GIS softwareESRI ArcViewMicrosoft PowerShellChatbot softwareNational Crime Information Center (NCIC) databaseNational Crime Information Center (NCIC) databaseTreasury Enforcement Communications System TECSTreasury Enforcement Communications System TECSOracle Business Intelligence Enterprise EditionOracle Business Intelligence Enterprise EditionFirewall softwareESRI ArcViewMicrosoft PowerShellChatbot softwareEncryption softwareEncryption softwareText mining softwareArrival Departure Information System ADISLink analysis softwareRefugee, Asylum and Parole System RAPSBiometric Storage System BSSPhoto enhancement softwareComputer Linked Application Information Management System CLAIMSComputer Linked Application Information Management System CLAIMSEmail softwareEmail softwareMicrosoft ExcelMicrosoft Office softwareMicrosoft Office softwareWeb browser softwareWeb browser softwareMicrosoft Access

Security Managers
Medium48.21%
Direct an organization's security functions, including physical security and safety of employees and facilities.
Management Analysts
Medium51.36%
Conduct organizational studies and evaluations, design systems and procedures, conduct work simplification and measurement studies, and prepare operations and procedures manuals to assist management in operating more efficiently and effectively. Includes program analysts and management consultants.
Security Management Specialists
Medium47.83%
Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security or the safety of employees and facilities.
Financial Risk Specialists
Medium55.00%
Analyze and measure exposure to credit and market risk threatening the assets, earning capacity, or economic state of an organization. May make recommendations to limit risk.
Fraud Examiners, Investigators and Analysts
Medium44.97%
Obtain evidence, take statements, produce reports, and testify to findings regarding resolution of fraud allegations. May coordinate fraud detection and prevention activities.
Information Security Analysts
Medium53.69%
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Penetration Testers
Medium51.14%
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Information Security Engineers
Medium52.50%
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Digital Forensics Analysts
Medium56.25%
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
Data Scientists
Medium59.38%
Develop and implement a set of techniques or analytics applications to transform raw data into meaningful information using data-oriented programming languages and visualization software. Apply data mining, data modeling, natural language processing, and machine learning to extract and analyze information from large structured and unstructured datasets. Visualize, interpret, and report data findings. May create dynamic data reports.
Business Intelligence Analysts
Medium52.10%
Produce financial and market intelligence by querying data repositories and generating periodic reports. Devise methods for identifying data patterns and trends in available information sources.
Social Science Research Assistants
Medium53.73%
Assist social scientists in laboratory, survey, and other social science research. May help prepare findings for publication and assist in laboratory analysis, quality control, or data management.
Forensic Science Technicians
Medium37.96%
Collect, identify, classify, and analyze physical evidence related to criminal investigations. Perform tests on weapons or substances, such as fiber, hair, and tissue to determine significance to investigation. May testify as expert witnesses on evidence or crime laboratory techniques. May serve as specialists in area of expertise, such as ballistics, fingerprinting, handwriting, or biochemistry.
Health Information Technologists and Medical Registrars
Medium57.81%
Apply knowledge of healthcare and information systems to assist in the design, development, and continued modification and analysis of computerized healthcare systems. Abstract, collect, and analyze treatment and followup information of patients. May educate staff and assist in problem solving to promote the implementation of the healthcare information system. May design, develop, test, and implement databases with complete history, diagnosis, treatment, and health status to help monitor diseases.
Detectives and Criminal Investigators
Low32.81%
Conduct investigations related to suspected violations of federal, state, or local laws to prevent or solve crimes.
Police Identification and Records Officers
Low31.22%
Collect evidence at crime scene, classify and identify fingerprints, and photograph evidence for use in criminal and civil cases.
Private Detectives and Investigators
Medium45.72%
Gather, analyze, compile, and report information regarding individuals or organizations to clients, or detect occurrences of unlawful acts or infractions of rules in private establishment.
Gambling Surveillance Officers and Gambling Investigators
Medium52.56%
Observe gambling operation for irregular activities such as cheating or theft by either employees or patrons. Investigate potential threats to gambling assets such as money, chips, and gambling equipment. Act as oversight and security agent for management and customers.
Retail Loss Prevention Specialists
Medium46.99%
Implement procedures and systems to prevent merchandise loss. Conduct audits and investigations of employee activity. May assist in developing policies, procedures, and systems for safeguarding assets.
Statistical Assistants
High75.61%
Compile and compute data according to statistical formulas for use in statistical studies. May perform actuarial computations and compile charts and graphs for use by actuaries. Includes actuarial clerks.
Survey Researchers
Medium52.28%
Plan, develop, or conduct surveys. May analyze and interpret the meaning of survey data, determine survey objectives, or suggest or test question wording. Includes social scientists who primarily design questionnaires or supervise survey teams.
Political Scientists
Medium45.66%
Study the origin, development, and operation of political systems. May study topics, such as public opinion, political decisionmaking, and ideology. May analyze the structure and operation of governments, as well as various political entities. May conduct public opinion surveys, analyze election results, or analyze public documents.
News Analysts, Reporters, and Journalists
Medium52.48%
Narrate or write news stories, reviews, or commentary for print, broadcast, or other communications media such as newspapers, magazines, radio, or television. May collect and analyze information through interview, investigation, or observation.
First-Line Supervisors of Police and Detectives
Medium36.93%
Directly supervise and coordinate activities of members of police force.
Police and Sheriff's Patrol Officers
Low27.10%
Maintain order and protect life and property by enforcing local, tribal, state, or federal laws and ordinances. Perform a combination of the following duties: patrol a specific area; direct traffic; issue traffic summonses; investigate accidents; apprehend and arrest suspects, or serve legal processes of courts. Includes police officers working at educational institutions.
Customs and Border Protection Officers
Medium35.91%
Investigate and inspect persons, common carriers, goods, and merchandise, arriving in or departing from the United States or between states to detect violations of immigration and customs laws and regulations.

AI Readiness Accelerator

A practical course designed for small and medium businesses to master AI and automation. Learn how to identify opportunities, implement AI tools, and streamline your operations for a future-proof business. No technical background required!

Learn More

AI Prompt Guides

Unlock industry- and job-specific prompt guides to get the most out of AI tools. Our guides are tailored for your sector and role, helping you craft effective prompts for real-world results. Stay ahead with expert strategies!

Browse Guides

AI Prompt Tool

Find, try, and share expert prompts and automations for key jobs and tasks. Access a growing library from our experts and the community, and test prompts with your own data. Discover new ways to automate and innovate!

Try the Tool